{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,10,14]],"date-time":"2025-10-14T07:01:30Z","timestamp":1760425290726},"publisher-location":"Cham","reference-count":20,"publisher":"Springer International Publishing","isbn-type":[{"type":"print","value":"9783319104300"},{"type":"electronic","value":"9783319104317"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2014]]},"DOI":"10.1007\/978-3-319-10431-7_4","type":"book-chapter","created":{"date-parts":[[2014,8,4]],"date-time":"2014-08-04T09:27:28Z","timestamp":1407144448000},"page":"35-49","source":"Crossref","is-referenced-by-count":15,"title":["A Thread-Safe Library for Binary Decision Diagrams"],"prefix":"10.1007","author":[{"given":"Alberto","family":"Lovato","sequence":"first","affiliation":[]},{"given":"Damiano","family":"Macedonio","sequence":"additional","affiliation":[]},{"given":"Fausto","family":"Spoto","sequence":"additional","affiliation":[]}],"member":"297","reference":[{"unstructured":"2011 CWE\/SANS Top 25 Most Dangerous Software Errors, \n                    \n                      http:\/\/cwe.mitre.org\/top25","key":"4_CR1"},{"unstructured":"BuDDy, \n                    \n                      http:\/\/buddy.sourceforge.net","key":"4_CR2"},{"unstructured":"CAL, \n                    \n                      http:\/\/embedded.eecs.berkeley.edu\/Research\/cal_bdd","key":"4_CR3"},{"unstructured":"CUDD, \n                    \n                      http:\/\/vlsi.colorado.edu\/~fabio\/CUDD","key":"4_CR4"},{"unstructured":"The Hadoop Big Data Engine, \n                    \n                      http:\/\/hadoop.apache.org","key":"4_CR5"},{"unstructured":"ITC99 Benchmark Circuits, \n                    \n                      http:\/\/www.cerc.utexas.edu\/itc99-benchmarks\/bench.html","key":"4_CR6"},{"unstructured":"The JavaBDD Library, \n                    \n                      http:\/\/javabdd.sourceforge.net","key":"4_CR7"},{"unstructured":"JDD, \n                    \n                      http:\/\/javaddlib.sourceforge.net\/jdd","key":"4_CR8"},{"unstructured":"The Julia Static Analyzer, \n                    \n                      http:\/\/www.juliasoft.com","key":"4_CR9"},{"unstructured":"SableJBDD, \n                    \n                      http:\/\/www.sable.mcgill.ca\/~fqian\/SableJBDD","key":"4_CR10"},{"issue":"1","key":"4_CR11","doi-asserted-by":"publisher","first-page":"3","DOI":"10.1016\/S0167-6423(96)00039-1","volume":"31","author":"T. Armstrong","year":"1998","unstructured":"Armstrong, T., Marriott, K., Schachte, P., S\u00f8ndergaard, H.: Two Classes of Boolean Functions for Dependency Analysis. Science of Computer Programming\u00a031(1), 3\u201345 (1998)","journal-title":"Science of Computer Programming"},{"issue":"2\/3","key":"4_CR12","doi-asserted-by":"publisher","first-page":"171","DOI":"10.1023\/A:1008699807402","volume":"10","author":"R.I. Bahar","year":"1997","unstructured":"Bahar, R.I., Frohm, E.A., Gaona, C.M., Hachtel, G.D., Macii, E., Pardo, A., Somenzi, F.: Algebraic Decision Diagrams and Their Applications. Formal Methods in System Design\u00a010(2\/3), 171\u2013206 (1997)","journal-title":"Formal Methods in System Design"},{"doi-asserted-by":"crossref","unstructured":"Brace, K.S., Rudell, R.L., Bryant, R.E.: Efficient implementation of a BDD Package. In: DAC, pp. 40\u201345 (1990)","key":"4_CR13","DOI":"10.1145\/123186.123222"},{"issue":"8","key":"4_CR14","doi-asserted-by":"publisher","first-page":"677","DOI":"10.1109\/TC.1986.1676819","volume":"35","author":"R.E. Bryant","year":"1986","unstructured":"Bryant, R.E.: Graph-Based Algorithms for Boolean Function Manipulation. IEEE Transactions on Computers\u00a035(8), 677\u2013691 (1986)","journal-title":"IEEE Transactions on Computers"},{"issue":"3","key":"4_CR15","doi-asserted-by":"publisher","first-page":"293","DOI":"10.1145\/136035.136043","volume":"24","author":"R.E. Bryant","year":"1992","unstructured":"Bryant, R.E.: Symbolic Boolean Manipulation with Ordered Binary Decision Diagrams. ACM Computing Surveys\u00a024(3), 293\u2013318 (1992)","journal-title":"ACM Computing Surveys"},{"issue":"2","key":"4_CR16","doi-asserted-by":"publisher","first-page":"142","DOI":"10.1016\/0890-5401(92)90017-A","volume":"98","author":"J.R. Burch","year":"1992","unstructured":"Burch, J.R., Clarke, E.M., McMillan, K.L., Dill, D.L., Hwang, L.J.: Symbolic Model Checking: 1020 States and Beyond. Information and Computation\u00a098(2), 142\u2013170 (1992)","journal-title":"Information and Computation"},{"key":"4_CR17","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"346","DOI":"10.1007\/978-3-540-30579-8_23","volume-title":"Verification, Model Checking, and Abstract Interpretation","author":"S. Genaim","year":"2005","unstructured":"Genaim, S., Spoto, F.: Information Flow Analysis for Java Bytecode. In: Cousot, R. (ed.) VMCAI 2005. LNCS, vol.\u00a03385, pp. 346\u2013362. Springer, Heidelberg (2005)"},{"issue":"2","key":"4_CR18","first-page":"163","volume":"39","author":"O. Lhot\u00e1k","year":"2009","unstructured":"Lhot\u00e1k, O., Curial, S., Amaral, J.N.: Using XBDDs and ZBDDs in Points-to Analysis. Software: Practive and Experience\u00a039(2), 163\u2013188 (2009)","journal-title":"Software: Practive and Experience"},{"doi-asserted-by":"crossref","unstructured":"Minato, S.: Zero-Suppressed BDDs for Set Manipulation in Combinatorial Problems. In: Proc. of Design Automation Conference, pp. 272\u2013277 (1993)","key":"4_CR19","DOI":"10.1145\/157485.164890"},{"key":"4_CR20","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"95","DOI":"10.1007\/11609773_7","volume-title":"Verification, Model Checking, and Abstract Interpretation","author":"S. Rossignoli","year":"2006","unstructured":"Rossignoli, S., Spoto, F.: Detecting Non-Cyclicity by Abstract Compilation into Boolean Functions. In: Emerson, E.A., Namjoshi, K.S. (eds.) VMCAI 2006. LNCS, vol.\u00a03855, pp. 95\u2013110. Springer, Heidelberg (2006)"}],"container-title":["Lecture Notes in Computer Science","Software Engineering and Formal Methods"],"original-title":[],"link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-319-10431-7_4","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2019,5,27]],"date-time":"2019-05-27T13:34:15Z","timestamp":1558964055000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/978-3-319-10431-7_4"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2014]]},"ISBN":["9783319104300","9783319104317"],"references-count":20,"URL":"https:\/\/doi.org\/10.1007\/978-3-319-10431-7_4","relation":{},"ISSN":["0302-9743","1611-3349"],"issn-type":[{"type":"print","value":"0302-9743"},{"type":"electronic","value":"1611-3349"}],"subject":[],"published":{"date-parts":[[2014]]}}}